Site icon CloudBrain

Chinese Cyber Attackers Utilize MAVInject.exe to Bypass Detection in Targeted Operations

Chinese Cyber Attackers Utilize MAVInject.exe to Bypass Detection in Targeted Operations

Introduction to Mustang Panda’s Cyber Operations

The cyber world is facing significant threats from state-sponsored hacking groups, with Mustang Panda being one of the notable adversaries. This group, operating from China, has been detected using innovative methods to evade detection while maintaining control over compromised systems. Their latest tactics involve exploiting legitimate software in order to deliver malicious payloads undetected.

The Tactics Used by Mustang Panda

Use of Legitimate Software

Mustang Panda has recently started using a legitimate Microsoft Windows tool called Microsoft Application Virtualization Injector (MAVInject.exe). This utility enables them to inject malicious code into other external processes. They particularly target the process "waitfor.exe" when they detect ESET antivirus software running on the infected machine. By doing this, they significantly reduce the chance of their actions being flagged as suspicious.

Attack Sequence Overview

The attack typically begins with the deployment of an executable file referred to as "IRSetup.exe". This file acts as a dropper, introducing multiple other files into the system, including:

By employing this method, the attackers aim to confuse victims and hinder their ability to recognize the true nature of the attack.

Mechanism and Execution

Sideloading Malicious Code

In this complex cyber operation, the threat actors sideload a modified version of a known backdoor called TONESHELL. This modification is done through a widely used application by Electronic Arts (EA)—specifically, the "OriginLegacyCLI.exe". The malware utilizes a rogue dynamic link library (DLL) called "EACore.dll."

Process Checks and Execution

The malware checks for the operation of certain ESET antivirus processes, namely "ekrn.exe" or "egui.exe". If these processes are found, the malware executes "waitfor.exe" and subsequently uses MAVInject.exe to run its code without raising any alarms. This ability to stealthily inject malicious code into legitimate processes is a significant threat as it complicates detection efforts for antivirus solutions.

Communication with Command-and-Control Servers

Once the malware is effective, it is capable of decrypting embedded shellcode. This shellcode establishes a connection with a remote server, often disguised with an innocuous-looking domain. Through this channel, the malware can receive commands, allowing it to execute various operations, such as:

The use of this communication method makes it easier for the attackers to control the malware remotely and carry out their agenda without being detected easily.

Conclusion

Mustang Panda’s use of legitimate software to execute their attacks signifies a worrying trend in cybersecurity threats. By employing clever tactics to bypass detection mechanisms, these state-sponsored hackers are creating an urgent need for enhanced security measures. Organizations and individuals must remain vigilant, utilizing advanced cybersecurity practices to safeguard against such sophisticated attacks. Regular updates to security software, user education on recognizing suspicious activities, and employing multi-layered security protocols can significantly reduce the risk of falling victim to these devious cyber operations.

Recommendations for Enhanced Safety

By taking proactive steps, individuals and organizations can protect themselves from the evolving cyber threats posed by groups like Mustang Panda.

Exit mobile version